2023
DOI: 10.1109/tcyb.2021.3127657
|View full text |Cite
|
Sign up to set email alerts
|

AutoBCS: Block-Based Image Compressive Sensing With Data-Driven Acquisition and Noniterative Reconstruction

Abstract: Block compressive sensing is a well-known signal acquisition and reconstruction paradigm with widespread application prospect of science, engineering and cybernetic systems. However, the state-of-the-art block-based image compressive sensing (BCS) generally suffer from two issues. The sparsifying domain and the sensing matrices widely used for image acquisition are not data-driven, thus ignoring both the features of the image and the relationship among sub-block images. Moreover, it requires to address high-di… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 68 publications
0
2
0
Order By: Relevance
“…In [14], a deep learning (DL) scheme was exploited for block-based image compressive sensing. In particular, image priors were used adaptively in the acquisition stage, and a reconstruction system was developed to achieve fast image reconstruction.…”
Section: B Learning-based Image Reconstructionmentioning
confidence: 99%
“…In [14], a deep learning (DL) scheme was exploited for block-based image compressive sensing. In particular, image priors were used adaptively in the acquisition stage, and a reconstruction system was developed to achieve fast image reconstruction.…”
Section: B Learning-based Image Reconstructionmentioning
confidence: 99%
“…In their work, the feature set with prominent discrimination is selected from unencrypted transport layer security (TLS) handshake information, DNS response information related to the destination IP address in TLS fow, and header information of HTTP fow within the 5-minute window of the same IP source address, and the network trafc with malicious behavior is identifed from encrypted network trafc by the machine learning method. Inspired by efcient feature extraction capabilities of deep learning technology [13][14][15], Wei et al [16] used a one-dimensional convolutional neural network (1D-CNN) to better ft encryption trafc data based on Anderson and other predecessors' work. In 2018, Yang et al [17] proposed two deep learning methods to classify encryption trafc.…”
Section: Introductionmentioning
confidence: 99%